Activating FRM in Hyperswitch

You can enable the FRM solution of your choice with few clicks and very minimal code changes. Below are the two scenarios for activating FRM within Hyperswitch.

Prerequisites

Before activation, ensure the following:

  1. Payment Method Information: Required for configuration.

  2. FRM Solution Signup: Obtain API keys from your selected FRM provider.

Pre-Authorization Flow

The Pre-Auth flow is executed before payment authorization. When a customer initiates a payment, transaction details are analyzed by the FRM solution to assess risk using parameters like historical behavior, location, transaction patterns, and device data.

  • Goal: Prevent fraudulent transactions before authorization.

  • Steps:

    1. Transaction details are sent to the FRM solution for analysis.

    2. Based on the risk score or recommendation, actions are taken:

      • Continue on Accept: Proceed with the transaction.

      • Halt on Decline: Mark the transaction as cancelled.

Post-Authorization Flow

The Post-Auth flow occurs after payment authorization by the processor. It serves as a second validation layer, analyzing the transaction using updated and historical data to detect potential fraud.

  • Goal: Act as a safety net for suspicious transactions.

  • Steps:

    1. Post-authorization details are sent to the FRM solution.

    2. Transactions flagged as fraudulent are queued for manual review.

    3. Merchants review and decide whether to:

      • Continue on Accept: Continue with the transaction.

      • Halt on Decline: Mark the transaction as cancelled.

      • Approve/Decline on Review:

        • Hold the transaction in manual review state. Merchants can list and review such transactions.

        • If approved: Capture the payment.

        • If declined: Void the payment.

If the connector doesn’t support manual capture, Post-Authorization manual review should be avoided during configuration setup for the respective connector.

FRM status and decisions

FRM connectors generally provide a decision based on rules or data models along with a risk score associated with the transaction. Some integrations require providing the model to be used explicitly. For example, Signifyd can be configured to respond with only scores or decision + scores, etc.

Fraud detection can be done via the below methods:

  • Rules: Uses a static set of rules for deciding on the outcome.

  • Scores: Uses a range of numbers for associating risk with the transaction.

  • Decisions/Recommendations: Uses ML data models for predicting and recommending the outcome.

  • Chargeback Guarantee: Uses ML data models for responding with a binary outcome (Accept vs Decline).

Currently, Hyperswitch offers only a single way of integrating with the underlying FRM connector:

  • Signifyd: Decision/Recommendation.

  • Riskified: Chargeback guarantee.

How to Get Started with Hyperswitch FRM Integration

  1. Log in to Your Hyperswitch Account

  2. Navigate to the 'Fraud & Risk' Tab

    • Select the Fraud and Risk Management (FRM) processor you want to integrate.

  3. Configure Payment Methods and Actions

    • Set up the payment methods and define preferred actions for each enabled payment method.

  4. Provide API Credentials

    • Enter the API credentials for the selected FRM processor.

  5. Integrate and Test

    • Access the API Documentation to integrate the FRM API.

    • Start testing payments with fraud checks to ensure the setup works as expected.

Test a payment
FAQs

What are the prerequisites for integrating with the Hyperswitch FRM platform?

Depending on your chosen FRM processor, you may need to pass additional parameters, such as order fulfillment data, via a webhook to Hyperswitch. Refer to the relevant documentation for detailed instructions.

Can I adjust fraud prevention measures based on specific payment methods and connectors?

Yes, the Hyperswitch FRM platform allows customization of fraud prevention strategies. You can configure pre-authorization and post-authorization checks for individual payment methods and processors, along with their corresponding actions.

Last updated